Más contenido relacionado La actualidad más candente (20) Similar a Context based access control systems for mobile devices (20) Más de LeMeniz Infotech (20) Context based access control systems for mobile devices1. Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Context-Based Access Control Systems for
Mobile Devices
Abstract
Mobile Android applications often have access to sensitive data and
resources on the user device. Misuse of this data by malicious applications may
result in privacy breaches and sensitive data leakage. An example would be a
malicious application surreptitiously recording a confidential business
conversation. The problem arises from the fact that Android users do not have
control over the application capabilities once the applications have been granted
the requested privileges upon installation. In many cases, however, whether an
application may get a privilege depends on the specific user context and thus we
need a context-based access control mechanism by which privileges can be
dynamically granted or revoked to applications based on the specific context of the
user. In this project we propose such an access control mechanism. Our
implementation of context differentiates between closely located subareas within
the same location. We have modified the Android operating system so that context-
based access control restrictions can be specified and enforced. We have
performed several experiments to assess the efficiency of our access control
mechanism and the accuracy of context detection.
EXISTING SYSTEM
Mobile Android applications often have access to sensitive data and
resources on the user device. In location-based policy systems are not accurate
enough to differentiate between nearby locations without extra hardware or
location devices.
2. Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
DRAWBACK OF EXISTING SYSTEM
Sensitive data leakage.
Easily attacked by malicious.
Security and privacy risks.
PROPOSED SYSTEM
Context-based access control mechanism by which privileges can be
dynamically granted or revoked to applications based on the specific context of the
user.
Our implementation of context differentiates between closely located subareas
within the same location. We have modified the Android operating system so that
context-based access control restrictions can be specified and enforced.
ADVANTAGE OF PROPOSED SYSTEM
Assess the efficiency.
Accuracy of context detection.
SYSTEM SPECIFICATION
Hardware Requirements
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 Mb
Monitor : 15 VGA Colour
3. Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Mouse : Logitech
Ram : 512 Mb
Software Requirements
Operating system : Windows Family
Tools : eclipse
Technology Used : Java
Backend Used : SQLITE